US20040205359A1 - Packet filtering method for securing security in communications and packet communications system - Google Patents
Packet filtering method for securing security in communications and packet communications system Download PDFInfo
- Publication number
- US20040205359A1 US20040205359A1 US10/642,504 US64250403A US2004205359A1 US 20040205359 A1 US20040205359 A1 US 20040205359A1 US 64250403 A US64250403 A US 64250403A US 2004205359 A1 US2004205359 A1 US 2004205359A1
- Authority
- US
- United States
- Prior art keywords
- packet
- filtering
- filter key
- user
- receiving
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000001914 filtration Methods 0.000 title claims abstract description 157
- 238000004891 communication Methods 0.000 title claims description 101
- 238000000034 method Methods 0.000 title claims description 26
- 230000006870 function Effects 0.000 description 21
- 230000005540 biological transmission Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 2
- 239000000463 material Substances 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 101150012579 ADSL gene Proteins 0.000 description 1
- 102100020775 Adenylosuccinate lyase Human genes 0.000 description 1
- 108700040193 Adenylosuccinate lyases Proteins 0.000 description 1
- 230000003139 buffering effect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000012447 hatching Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0263—Rule management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0807—Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
Definitions
- the present invention relates to a packet filtering method for securing security in communications over the Internet, communication equipment and an authentication apparatus for the same, and a packet communication system
- Filtering technology is technology for restricting unsuitable access from the Internet or to the Internet when a company etc. connects to the Internet.
- the filtering technology is mounted as a filtering means in the firewall or router or host or other communication equipment. This filtering means judges whether each packet access from the Internet at the company etc. (or vice versa) matches with a predetermined restrictive condition and when matching it discards that packet.
- the private address used in an intranet of a company etc. is an address which can be freely used only inside the company, so having a packet including such an address transferred on the Internet would be unsuitable and therefore that packet is discarded by the above filtering means.
- a specific port number is designated for a specific application, and only packets including that port number are allowed to be accessed by the filtering means.
- FIG. 20 is a view schematically showing a network covered by the present invention.
- the left side shows the Internet constructed by ISPs (Internet service providers), while the right side shows a company network such as an intranet. Further, communication equipment is arranged at their boundary. The present invention mainly covers this communication equipment.
- communication equipment in the present invention is a general term for the above-mentioned firewall or router or host. Packet filtering is performed in this communication equipment.
- FIG. 21 is a view of the general configuration of conventional communication equipment.
- FIG. 22 is a view showing in detail a comparing table 12 of FIG. 21.
- reference numeral 10 is the above communication equipment. Specifically, it is a router or a host.
- the communication equipment 10 is provided with a comparing means 11 for the packet filtering.
- This comparing means 11 is provided with a comparing table 12 . While this comparing table 12 is being referred to, whether an input (IN) packet PKT is to be passed or discarded is determined. A packet PKT for which pass through is permitted is output from OUT.
- FIG. 22 A detailed example of a comparing table 12 referred to for pass through or discard is shown in FIG. 22.
- the comparing table 12 stores filter conditions ( ⁇ 1>, ⁇ 2> . . . ⁇ k>) as a list in advance.
- filter conditions that is, the “destination IP address”, “source IP address”, “destination port number”, “source port number”, etc. are checked for each packet. A packet PKT which does not match the conditions is discarded.
- the “mask for destination IP address” in the comparing table 12 means that the lower n (m>n) bits in for example the destination IP address (m bits) are masked (ignored). Due to this mask, filtering is possible for a plurality of communication partners as a single group, so efficiency is good.
- the “mask for source IP address” in the table 12 is also used for a similar purpose.
- the object of the filter condition designated at the comparing table 12 is usually information described in the header of each packet. Actual examples are shown below for such a header.
- FIG. 23 is a view of the format showing the actual content of an IPv4 header
- FIG. 24 is a view of the format showing the actual content of an IPv6 header
- FIG. 25 is a view of the format showing the actual content of a TCP header
- FIG. 26 is a view of the format showing the actual content of a UDP header.
- IPv4 IP Version 4
- the source IP address is checked by the “Source Address”, while the destination IP address is checked by the “Destination Address”.
- IPv6 IP Version 6
- IP Version 6 header of FIG. 24 is similar to the case of FIG. 23.
- the TCP (transmission control protocol) header of FIG. 25 functions as an upper layer above the IP, but in the same way as above, the source port number is checked by the “Source Port”, while the destination port number is checked by the “Destination Port”. Note that this “Destination Port” often designates a specific application.
- UDP user datagram protocol
- the present invention has as its object to provide a packet filtering method able to greatly reduce the number of entries of filter conditions and to handle even IPsec and communication equipment for the same.
- the present invention provides a packet filtering system able to streamline the filter conditions for filtering and to handle even IPsec. Further, this method is comprised of:
- FIG. 1 is a flow chart of a packet filtering method according to the present invention
- FIG. 2 is a view of a general packet including a TCP/UDP header
- FIG. 3 is a view of a general packet employing IPsec
- FIG. 4 is a view of a packet in the case of use of conventional filtering
- FIG. 5 is a view of a packet storing a filter key based on the present invention
- FIG. 6 is a view of a packet in the case of employing IPsec in a packet of the present invention shown in FIG. 5,
- FIG. 7 is a view of the format of the actual content of an IPv6 extended header
- FIG. 8 is a view illustrating a network to which the present invention is applied.
- FIG. 9 is a view of the basic configuration of communication equipment at a packet receiving side based on the present invention.
- FIG. 10 is a view of a first specific example of communication equipment of FIG. 9,
- FIG. 11 is a view of a second specific example of communication equipment of FIG. 9,
- FIG. 12 is a view of the basic configuration of communication equipment of a packet sending side based on the present invention.
- FIG. 13 is a view of a first specific example of communication equipment of FIG. 12,
- FIG. 14 is a view of a second specific example of communication equipment of FIG. 12,
- FIG. 15 is a view showing in brief a packet communication system to which the present invention is applied.
- FIG. 16 is a view of the basic configuration of an authentication apparatus shown in FIG. 15,
- FIG. 17 is a view of a specific example of the configuration of an authentication means shown in FIG. 16,
- FIG. 18 is a view of an example of a filter key assigning table 67 of FIG. 17,
- FIG. 19 is a sequence diagram showing a series of procedures for providing a filter key
- FIG. 20 is a view briefly showing a network covered by the present invention.
- FIG. 21 is a view of the general configuration of a conventional communication equipment
- FIG. 22 is a view showing in detail a comparing table 12 of FIG. 21,
- FIG. 23 is a view of the format showing the actual content of an IPv4 header
- FIG. 24 is a view of the format showing the actual content of an IPv6 header
- FIG. 25 is a view of the format showing the actual content of a TCP header
- FIG. 26 is a view of the format showing the actual content of a UDP header
- FIG. 27 is a view of a specific network to which the present invention is applied.
- FIG. 1 is a flow chart of a packet filtering method according to the present invention.
- steps S 11 to S 15 shown in the figure are steps S 11 and S 12 .
- Step S 11 Filtering information for use in filtering at the receiving side is stored in a packet to be sent to the receiving side and sent from the sending side.
- Step S 12 The packet from the sending side is received and the filtering information stored in the packet is detected and used for filtering at the receiving side.
- the filtering operation (S 13 to S 15 ) at the receiving side is substantially the same as in the past.
- Step S 13 The receiving side holds the filtering information of the receiving side determined in advance and compares the filtering information of the sending side detected from the packet with the filtering information of the receiving side.
- Step S 14 If the result of the comparison is that the two match, the packet is allowed to pass.
- Step S 15 If the result of the comparison is that the two do not match, the packet is discarded.
- the present invention determines the filter conditions using newly defined filtering information.
- the codes forming the filtering information will hereinafter be called the “filter key” in the present invention.
- the present invention uses the simple filter key, instead of filter data serving as the troublesome filter conditions of the past shown in FIG. 22, or together with the conventional filter data. Further, this filter key is used for the above comparison.
- the present invention realizes the desired filtering by embedding a specific filter key predetermined between communicating partners into each packet used for that communication. In this case, however, there is the problem as to where, in the packet, the filter key should be stored.
- the present invention adopts the following technique for storage of the filter key so as to simultaneously solve the above-mentioned second problem, that is, the TCP header or UDP header being encrypted by the IPsec and thus the filtering becoming impossible.
- the background leading to this storage technique will be explained step by step along with the following drawings.
- FIG. 2 is a view of a general packet including a TCP/UDP header.
- the IP header is placed at the head of the packet PKT, then the TCP header (or UDP header) is placed, then finally the inherent data follows.
- FIG. 3 is a view of a general packet employing IPsec.
- the IPsec ESP Encapsulating Security Payload
- TCP header or UDP header
- data end up shown by hatching
- FIG. 4 is a view of a packet in the case of use of conventional filtering.
- the filter conditions explained in FIG. 22 are set at F (for IP header) or F′ (for TCP or UDP header) in the packet PKT.
- FIG. 5 is a view of a packet storing a filter key based on the present invention.
- This packet is a packet in compliance with IPv6.
- the filter key FK is stored in the IPv6 extended header (EXT).
- this EXT is formed as a filter key header.
- the filter key FK′ (shown by broken lines) is stored in a flow label region in the IPv6 header.
- This flow label region is already shown as “Flow Label” at the top right of FIG. 24 (IPv6 header) explained above. The method of use of this region has not yet been decided.
- FIG. 6 is a view of a packet in the case of employing IPsec in a packet of the present invention shown in FIG. 5.
- FIG. 7 is a view of the format of the actual content of an IPv6 extended header.
- This IPv6 extended header is based on the option format of IPv6.
- the IPv6 extended header EXT is arranged, in the format, after the IPv6 header shown in FIG. 24. Further, it is possible to connect a plurality of EXT's in series. Therefore, the IPsec encrypted header shown in FIG. 6 can also be placed as one of the plurality of EXT's. The boundary with the next EXT is known by “Hdr Ext Len” (EXT length) in FIG. 7.
- the filter key FK can be stored in one of the EXT's or the EXT itself can be used as a filter key header.
- FIG. 8 is a view illustrating a network to which the present invention is applied.
- FK 0x87260fa879cb90
- the communication equipment 10 c which is placed at the boundary of one network (Internet) and another network (intranet) holds this FK in advance.
- the above filter key FK is stored in the series of packets from the communication equipment 10 b . Therefore, the FK matches with the filter key held in the communication equipment 10 c . The packets can therefore pass through the equipment 10 c and reach the communication equipment 10 d.
- the filter key FK stored in the series of packets from the communication equipment 10 a are different from the above FK (in the figure, shown with “!” mark, where “!” means “NOT”). Therefore, the series of packets from the equipment 10 a are judged to mismatch in filter key at the communication equipment 10 c and are discarded. Note that the comparing means for performing this judgement is shown in the later explained FIG. 9. Here, refer once to FIG. 27.
- FIG. 27 is a view of a specific network to which the present invention is applied.
- a corporate network 200 is comprised of communication equipment (host) 210 having the functions of the present invention plus a router 22 connected to an access channel for accessing an edge router 110 of the Internet 100 .
- communication equipment 310 to which the present invention is applied is placed via a router 320 (or wireless LAN base station, L 2 switch, hub, ADSL modem, media converter, etc.) connected to the Internet 100 through a LAN cable or phone line.
- This communication equipment 310 may be a laptop PC as well. In this case, data communications card of a PHS, PDC or W-CDMA is used.
- the Internet 100 can be accessed by communication equipment to which the present invention is applied from a general home 400 , a hotel room 500 , or a hot spot 600 by a wireless LAN.
- a router 220 in a corporate network 200 can manage the filter keys of a plurality of communication equipment in the company, so operation of not applying the present invention to the communication equipment 210 etc. is also possible.
- FIG. 9 is a view of the basic configuration of communication equipment at a packet receiving side based on the present invention. That is, the communication equipment 10 of this figure is communication equipment of the packet receiving side including means for achieving packet filtering, for example, a router or host. This communication equipment is provided with a filter key detecting unit 20 which receives the packet PKT sent from the sending side which, stores freely determined filtering information as the filter key FK in a header portion of the packet PKT, and detects a filter key FK from this header portion.
- a filter key detecting unit 20 which receives the packet PKT sent from the sending side which, stores freely determined filtering information as the filter key FK in a header portion of the packet PKT, and detects a filter key FK from this header portion.
- a comparing means 21 for comparing the filter key of the sending side detected by the filter key detecting unit 20 with the filter key of the receiving side held in advance, judges if the two match, and when they do not match instructs that the received packets be discarded.
- This comparing means 21 has a filter key table 22 for holding filter keys FK in the form of a list.
- FIG. 10 is a view of a first specific example of communication equipment of FIG. 9.
- the communication equipment 10 of this first specific example is provided with a buffer 27 for temporarily storing received packet PKT passing through a filter key header detecting unit 23 which forms the above-mentioned filter key detecting unit 20 .
- the above-mentioned comparing means 21 is comprised of:
- a filter key table 22 for holding a predetermined plurality of different filter keys FK ( ⁇ 1>, ⁇ 2> . . . ⁇ k>),
- a search unit 25 for searching for whether there is a filter key matching with the filter key detected by the filter key header detecting unit 23 in the filter key table 22 and when there is none, outputting a discard command
- a buffer control unit 26 for receiving the discard command and controlling the system so that the packets stored in a buffer 27 are discarded.
- this first specific example shows a configuration of a case of forming a filter key header in the IPv6 extended header added to the IPv6 header when the packets PKT are packets in compliance with IPv6 (FIG. 7).
- FIG. 11 is a view of a second specific example of communication equipment of FIG. 9.
- the configuration of this figure is basically the same as the configuration of FIG. 10. There are two points of difference: the filter key detecting unit 20 is a flow label region detecting unit 24 and the detected filter key is FK′ (code is same as FK, but stored at different location in packet). The operation is the same as in FIG. 10.
- FIG. 12 is a view of the basic configuration of communication equipment of a packet sending side based on the present invention. That is, the communication equipment 10 of this figure is communication equipment of the packet sending side including means for achieving packet filtering, for example, a host, which is comprised of at least a setting unit 31 for setting freely determined filtering information, a filter key holding unit 32 for holding filtering information input by the setting unit 31 as a filter key FK, and a filter key storing means 33 for receiving the held filter key FK as input and storing the filter key in the header portion of a packet PKT.
- a host which is comprised of at least a setting unit 31 for setting freely determined filtering information, a filter key holding unit 32 for holding filtering information input by the setting unit 31 as a filter key FK, and a filter key storing means 33 for receiving the held filter key FK as input and storing the filter key in the header portion of a packet PKT.
- the filter key it is possible to use the port number of a TCP or UDP as they are
- the setting unit 31 is for example a keyboard. Codes of filter keys serving as the filtering information are input from there.
- the filter key may also be notified from another party by a dynamic negotiation. Further, it may be acquired from a system manager. In this case, the filter key may be updated in hour units, day units, or week units.
- FIG. 13 is a view of a first specific example of communication equipment of FIG. 12.
- the packets PKT are packets in compliance with IPv6 and the filter key storing means 33 is a filter key header producing unit 41 which forms a filter key header in an IPv6 extended header added to this IPv6 header.
- This filter key header is shown in FIG. 7.
- the communication equipment 10 (for example, host) of this figure is actually provided with other peripheral portions.
- an encrypted header producing unit 43 for generating an IPsec encrypted header (see FIG. 6) and an upper layer header producing unit 44 for generation of a TCP header or UDP header. Further, there is a data generating unit 45 for generating “data” shown in FIG. 12 to be transferred to the receiving side.
- a packet composing/encrypting unit 46 for receiving as input the outputs of the filter key header producing unit 41 , the encrypted header producing unit 43 , the upper layer header producing unit 44 , and the data generating unit 45 and generating packets PKT for the receiving side.
- the format of the output of the packets from the packet composing/encrypting unit 46 is as shown in FIG. 6.
- FIG. 14 is a view of a second specific example of communication equipment of FIG. 12.
- the packets PKT are packets in compliance with IPv6 and the filter key storage unit 33 is an IPv6 header producing unit 42 which stores a filter key FK′ in a flow label region in the IPv6 header.
- the flow label region accommodating this filter key FK′ is shown as “Flow Label” in FIG. 24.
- the communication equipment 10 of this figure also, like that shown in FIG. 13, has an encrypted header producing unit 43 for generating an IPsec encrypted header, an upper layer header producing unit 44 for generating a TCP header or UDP header, and a data generating unit 45 for generating data to be transferred to the receiving side and has a packet composing/encrypting unit 46 receiving, as input, the outputs from these.
- FIG. 15 is a view showing in brief a packet communication system to which the present invention is applied.
- the system 50 shown in this figure is a packet communication system where transferred packets are filtered and is provided with a packet transmitting apparatus 51 , a packet receiving apparatus 52 , and an authentication apparatus 53 .
- the packet transmitting apparatus 51 stores filtering information for use in filtering at the receiving side in the packets to be sent from the sending side to the receiving side for transmission.
- the packet receiving apparatus 52 receives packets from the sending side through the network between the server and client, detects the filtering information stored in the received packets, and uses it for filtering at the receiving side.
- the authentication apparatus 53 mediating between these receives user authentication information input from a user receiving the filtering service and authenticates the user. After authentication, it assigns and distributes a filter key as filtering information corresponding to that user authentication information to that user.
- This packet communication system 50 can be functionally expressed as in the following (I) and (II):
- the system 50 is a packet communication system providing a filtering service for packets transferred between a server and a client through a network and is provided with a first means and a second means used for access from the server or client of the user side to the network.
- first means and second means correspond to a filtering authentication means 61 and a filter key providing means 62 in for example the later explained FIG. 16 (same for packet communication system of later explained (II)).
- the packet communication system 50 having the filtering function user authentication becomes possible for access to the network. For example, access by an employee on a business trip from the business trip location through the Internet to the network of the organization to which he or she belongs becomes possible or access from a local network at the business trip location to the Internet becomes possible.
- the system 50 is a packet communication system providing a filtering service for packets transferred through a network between a server and client and is provided with a first means and second means used for access from a user of the network side to the server or client.
- the packet communication system 50 having the filtering function if the authentication for a service provided by the server is performed once at the start in hour units, day units, week units, etc., access can be restricted using the filter key without authentication thereafter.
- FIG. 16 is a view of the basic configuration of an authentication apparatus shown in FIG. 15.
- the authentication apparatus 53 (FIG. 15) is provided with a filtering authentication means 61 and a filter key providing means 62 .
- the filtering authentication means 61 receives user authentication information AI input from a user receiving the filtering service and authenticates the user. Further, the filter key providing means 62 assigns and distributes a filter key FK as filtering information corresponding to the user authentication information to the user after the authentication at the filtering authentication means 61 .
- FIG. 17 is a view of a specific example of the configuration of an authentication means shown in FIG. 16.
- the top side of the configuration in the figure corresponds to the filtering authentication means 61 of FIG. 16, while the bottom side corresponds to the filter key providing means 62 .
- the filtering authentication means 61 is comprised of a user authentication database (DB) 65 in which the user authentication information AI is registered in advance and a decision unit 64 for determining the veracity of the user authentication information AI input to and buffered by a receiving buffer 63 by referring to the user authentication database 65 .
- DB user authentication database
- the decision unit 64 for determining the veracity of the user authentication information AI input to and buffered by a receiving buffer 63 by referring to the user authentication database 65 .
- the filter key providing means 62 is comprised of a filter key assigning table 67 holding preassigned filter keys (FK) corresponding to user authentication information (AI) and a filter key sending unit 66 for buffering a corresponding filter key FK from the filter key assigning table 67 in a transmitting buffer 68 once and sending it to the user when the veracity is confirmed.
- a filter key assigning table 67 holding preassigned filter keys (FK) corresponding to user authentication information (AI) and a filter key sending unit 66 for buffering a corresponding filter key FK from the filter key assigning table 67 in a transmitting buffer 68 once and sending it to the user when the veracity is confirmed.
- a filter key sending unit 66 for buffering a corresponding filter key FK from the filter key assigning table 67 in a transmitting buffer 68 once and sending it to the user when the veracity
- FIG. 18 is a view of an example of a filter key assigning table of FIG. 17.
- the above user authentication information AI is for example a user ID and password. It would be convenient to the user if using a code or number which the user is familiar with.
- the left column AI of the table 67 records user ID's and passwords preset for a predetermined plurality of users.
- the right column records numbers etc. of filter keys assigned corresponding to the user ID's and passwords.
- the decision unit 17 of FIG. 17 refers to the user authentication database 65 where authentication information AI having a content similar to the left column AI of this table 67 is recorded and judges that AI input as shown at the top left of FIG. 17 matches with an AI in the database 65 , the matching AI (for example, the second AI of the AI column of FIG. 18) is input to the filter key sending unit 66 .
- This sending unit 66 takes out the second filter key (in this example, No. 2) corresponding to the AI from the filter key assigning table 67 and provides it to the user side.
- FIG. 19 is a sequence diagram showing a series of procedures for providing a filter key.
- FIG. 8 does not show at all the hardware/software relating to the authentication apparatus 53 .
- the authentication apparatus 53 may however be present somewhere in FIG. 8. That is, the authentication apparatus 53 can be located anywhere in FIG. 8.
- the authentication apparatus 53 can be built inside at least one of an authentication use server, firewall, router, and host.
- the sequence of FIG. 19 shows the case of making the authentication apparatus 53 an independent authentication use server.
- the filtering authentication means 61 and a filter key providing means 62 shown in FIG. 17 etc. are used for authentication at the authentication use server and the corresponding filter key FK is distributed from the authentication server to the client, the client sends transmission packets in which the filter key FK is embedded toward the server being accessed.
- the filter key FK passes through the above authentication, so is valid. It passes through communication equipment (for example, 10 c in FIG. 8). The transmitted packets can therefore reach the target server (right end).
- TCP and UDP are as explained in FIG. 2 to FIG. 6 and in FIG. 25 and FIG. 26.
- the port numbers of the TCP and UDP are shown in FIG. 25 and FIG. 26 as the source port number and destination port number.
- the port number used generally shows the units of service such as file transfer and Web.
- a copy of the port number is used as the filter key. Therefore, for example, the filter key is embedded in the extended region as FK as shown in FIG. 7.
- the users before starting VoIP communications, the users have to specify dynamically that the communication is VoIP.
- the value showing the VoIP negotiated between the users is embedded like in the filter key FK of FIG. 7, so as to enable the filtering of the VoIP as well.
- the value showing the VoIP simultaneously acts to enable the communication partner to recognize the VoIP and acts for filtering according to the present invention.
- registration numbers serial numbers showing software licenses, employee numbers of individual companies, etc.
- the registration number of software is effective in preventing illegitimate access to the server I from a malicious user when a new version of software is provided by a software manufacturer from the server to a user and is authentication information (AI) frequently routinely used. This is convenient for use as a filter key as well.
- an employee number is allotted to an individual employee in a company, so this is also convenient for use as a filter key.
- the “group” spoken of here is for example a group forming a conference of an academic society or company in which a large number of users get together.
- the conventional filtering technique was to set separate filter conditions (see FIG. 22) individually for individual users participating in the above conference. This however is complicated and troublesome.
- multicast packets can be used.
- the multicast packets reach all users insofar as there is no other gate means and therefore the content ends up being provided free of charge.
- the filtering information is stored in the flow label region in the IPv6 header.
- Appendix 1 A packet filtering method characterized by storing filtering information for use in filtering at a receiving side in a packet to be sent to the receiving side and sending it from a sending side.
- (Appendix 2) A packet filtering method characterized by receiving a packet from a sending side, detecting filtering information stored in that packet, and using it for filtering at a receiving side.
- Appendix 3 A packet filtering method as set forth in appendix 2, characterized by having the receiving side hold predetermined filtering information of the receiving side, compare filtering information of the sending side detected from the packet with the filtering information of the receiving side, and, when the two do not match, discard that packet.
- Appendix 4 A packet filtering method as set forth in appendix 1 or 2, characterized by storing the filtering information in an IPv6 header portion when the packet is a packet in compliance with IPv6.
- Appendix 5 A packet filtering method as set forth in appendix 1 or 2, characterized by storing the filtering information in an IPv6 extended header added to an IPv6 header when the packet is a packet in compliance with IPv6.
- Appendix 6 A packet filtering method as set forth in appendix 1 or 2, characterized by storing the filtering information in a flow label region in an IPv6 header when the packet is a packet in compliance with IPv6.
- the communication equipment characterized by having at least:
- a filter key holding unit for holding the filtering information input by the setting unit as a filter key
- a filter key storing function unit for receiving as input the held filter key and storing the filter key in a header portion of a packet.
- an upper layer header producing unit for generating a TCP header or UDP header
- a data generating unit for generating data to be transferred to the receiving side.
- an upper layer header producing unit for generating a TCP header or UDP header
- a data generating unit for generating data to be transferred to the receiving side.
- Appendix 13 Communication equipment as set forth in appendix 12, characterized by further having a packet composing/encrypting unit for receiving as input the outputs of the filter key header producing unit, encrypted header producing unit, upper layer header producing unit, and data generating unit and generating a packet to the receiving side.
- the communication equipment characterized by being provided with:
- a filter key detecting unit for receiving a packet sent from a sending side while storing freely determined filtering information as a filter key in a header portion of the packet and detecting the filter key from the header portion and
- a comparing function unit for comparing a filter key of a sending side detected by the filter key detecting unit with a filter key of the receiving side held in advance, determining if the two do not match, and, when they do not match, discarding the received packet.
- the equipment is provided with a buffer for temporarily storing a received packet passing through the filter key detecting unit and in that
- the comparing function unit is comprised of:
- a search unit for searching if there is a filter key matching with a filter key detected by the filter key detecting unit in the filter key table and when there is none, outputting a discard command
- a buffer control unit for receiving the discard command and controlling the system so as to discard the packet stored in the buffer.
- a filtering authentication function unit for receiving user authentication information input from a user receiving a filtering service and authenticating the user and
- a filter key providing function unit for assigning and distributing a filter key as filtering information corresponding to the user authentication information to the user after the authentication at the filtering authentication function unit.
- the filtering authentication function unit has:
- a decision unit for determining the veracity of the input user authentication information by referring to the user authentication database
- the filter key providing function unit has:
- a filter key assigning table holding a filter key assigned in advance corresponding to user authentication information
- a filter key sending unit for sending a corresponding filter key from the filter key assigning table to the user when the veracity is confirmed.
- Appendix 20 An authentication apparatus as set forth in appendix 18, characterized in that the authentication apparatus is built in at least one of an authentication use server, firewall, router, and host.
- Appendix 21 An authentication apparatus as set forth in appendix 18, characterized in that the user authentication information is a user ID and password.
- Appendix 22 An authentication apparatus as set forth in appendix 18, characterized by using a TCP or UDP port number as the filter key.
- Appendix 23 An authentication apparatus as set forth in appendix 18, characterized by making a value showing a VoIP negotiated between users as the filter key when communicating among users by using VoIP.
- Appendix 24 An authentication apparatus as set forth in appendix 18, characterized by making a personal ID the filter key when a personal ID is assigned individually to a user under certain specific conditions.
- Appendix 25 An authentication apparatus as set forth in appendix 18, characterized by determining in advance a shared ID specifying a group and making that shared ID the filter key when the user is a user belonging to a certain group.
- Appendix 26 An authentication apparatus as set forth in appendix 18, characterized by making a user ID notified in advance to only a user allowed to use content provided by a multicast packet as the filter key when a multicast packet is distributed at the same time to a plurality of users.
- Appendix 27 An authentication apparatus as set forth in appendix 18, characterized by storing the filtering information in an IPv6 extended header when the packet is a packet in compliance with IPv6.
- Appendix 28 An authentication apparatus as set forth in appendix 18, characterized by storing the filtering information in a flow label region in an IPv6 header when the packet is a packet in compliance with IPv6.
- the packet communication system characterized by being provided with:
- a packet transmitting apparatus for storing filtering information for use in filtering at a receiving side in a packet to be sent to the receiving side and sending it from a sending side
- a packet receiving apparatus for receiving a packet from the sending side through a network between a server and client, detecting filtering information stored in the received packet, and using it for filtering at the receiving side, and
- an authentication apparatus for receiving user authentication information input from a user receiving the filtering service, authenticating the user, and assigning and distributing a filter key as filtering information corresponding to the user authentication information to the user after the authentication.
- the packet communication system characterized by being provided with:
- a first function unit for receiving user authentication information and authenticating the user
- a second function unit for restricting access by assigning and distributing a filter key as filtering information corresponding to the user authentication information to the user after the authentication.
- the packet communication system characterized by being provided with:
- function units used for access from a user on a network side to the server or client that is,
- a first function unit for receiving user authentication information and authenticating the user
- a second function unit for restricting access by assigning and distributing a filter key as filtering information corresponding to the user authentication information to the user after the authentication.
- the table showing the filter conditions need only store the filter keys. Further, the filter keys do not correspond to the users (that is, correspond to IP addresses of all related terminals). It is possible to set them in correspondence with specific groups. Therefore, setting of filter keys in the table, that is, entries, is greatly streamlined. Further, the required memory capacity of the table can be greatly reduced.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Business, Economics & Management (AREA)
- General Business, Economics & Management (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
Abstract
Description
- This application is a continuation application and is based upon PCT/JP02/01434, filed on Feb. 19, 2002.
- The present invention relates to a packet filtering method for securing security in communications over the Internet, communication equipment and an authentication apparatus for the same, and a packet communication system
- Filtering technology is technology for restricting unsuitable access from the Internet or to the Internet when a company etc. connects to the Internet. Normally, the filtering technology is mounted as a filtering means in the firewall or router or host or other communication equipment. This filtering means judges whether each packet access from the Internet at the company etc. (or vice versa) matches with a predetermined restrictive condition and when matching it discards that packet.
- For example, the private address used in an intranet of a company etc. is an address which can be freely used only inside the company, so having a packet including such an address transferred on the Internet would be unsuitable and therefore that packet is discarded by the above filtering means. Alternatively, a specific port number is designated for a specific application, and only packets including that port number are allowed to be accessed by the filtering means.
- FIG. 20 is a view schematically showing a network covered by the present invention.
- In the figure, the left side shows the Internet constructed by ISPs (Internet service providers), while the right side shows a company network such as an intranet. Further, communication equipment is arranged at their boundary. The present invention mainly covers this communication equipment.
- Note that the above term “communication equipment” in the present invention is a general term for the above-mentioned firewall or router or host. Packet filtering is performed in this communication equipment.
- FIG. 21 is a view of the general configuration of conventional communication equipment, and
- FIG. 22 is a view showing in detail a comparing table12 of FIG. 21.
- In FIG. 21,
reference numeral 10 is the above communication equipment. Specifically, it is a router or a host. - The
communication equipment 10 is provided with acomparing means 11 for the packet filtering. This comparing means 11 is provided with a comparing table 12. While this comparing table 12 is being referred to, whether an input (IN) packet PKT is to be passed or discarded is determined. A packet PKT for which pass through is permitted is output from OUT. - A detailed example of a comparing table12 referred to for pass through or discard is shown in FIG. 22.
- Referring to this figure, the comparing table12 stores filter conditions (<1>, <2> . . . <k>) as a list in advance. When a packet PKT is input to the
communication equipment 10, in the case of an IP (Internet Protocol), the filter conditions, that is, the “destination IP address”, “source IP address”, “destination port number”, “source port number”, etc. are checked for each packet. A packet PKT which does not match the conditions is discarded. - The “mask for destination IP address” in the comparing table12 means that the lower n (m>n) bits in for example the destination IP address (m bits) are masked (ignored). Due to this mask, filtering is possible for a plurality of communication partners as a single group, so efficiency is good. The “mask for source IP address” in the table 12 is also used for a similar purpose.
- The object of the filter condition designated at the comparing table12 is usually information described in the header of each packet. Actual examples are shown below for such a header.
- FIG. 23 is a view of the format showing the actual content of an IPv4 header,
- FIG. 24 is a view of the format showing the actual content of an IPv6 header,
- FIG. 25 is a view of the format showing the actual content of a TCP header, and
- FIG. 26 is a view of the format showing the actual content of a UDP header.
- Referring to the IPv4 (IP Version 4) header of FIG. 23, the source IP address is checked by the “Source Address”, while the destination IP address is checked by the “Destination Address”.
- The IPv6 (IP Version 6) header of FIG. 24 is similar to the case of FIG. 23.
- The TCP (transmission control protocol) header of FIG. 25 functions as an upper layer above the IP, but in the same way as above, the source port number is checked by the “Source Port”, while the destination port number is checked by the “Destination Port”. Note that this “Destination Port” often designates a specific application.
- The UDP (user datagram protocol) header of FIG. 26 is also similar to the case of FIG. 25 explained above.
- According to the conventional comparing means11 (FIG. 21) explained above, the following problems arise: First, as the number of communication partners increases more and more in the future, the number of filter conditions will also increase. That is, the number of entries to the comparing table 12 will end up increasing and the filtering time will increase together with the increase in the hardware.
- Second, there is the problem that when introducing IPsec (IP Security) protocol expected to increase in usage in the future, the above-mentioned upper layer TCP headers or UDP headers will end up being encrypted by the IPsec, so filtering using the “Source Port” and “Destination Port” shown in FIG. 25 and FIG. 26 will no longer be possible.
- Further, ancillary to this, in so-called “peer-to-peer” type applications where the port number is dynamically determined by negotiation like the VoIP (Voice over IP), the above filtering is not possible by static settings. As a result, to secure security, it is necessary to filter all VoIP packets, so there is the problem that VoIP cannot in fact be used.
- In view of the above problems, the present invention has as its object to provide a packet filtering method able to greatly reduce the number of entries of filter conditions and to handle even IPsec and communication equipment for the same.
- To achieve this object, the present invention provides a packet filtering system able to streamline the filter conditions for filtering and to handle even IPsec. Further, this method is comprised of:
- (i) a step of storing filtering information for use in filtering at the receiving side in a packet to be sent to a receiving side and sending this from the sending side and
- (ii) a step of receiving the packet from the sending side, detecting the filtering information stored in the packet, and use this for filtering at the receiving side. Further, this filtering information is comprised of a simple filter key.
- FIG. 1 is a flow chart of a packet filtering method according to the present invention,
- FIG. 2 is a view of a general packet including a TCP/UDP header,
- FIG. 3 is a view of a general packet employing IPsec,
- FIG. 4 is a view of a packet in the case of use of conventional filtering,
- FIG. 5 is a view of a packet storing a filter key based on the present invention,
- FIG. 6 is a view of a packet in the case of employing IPsec in a packet of the present invention shown in FIG. 5,
- FIG. 7 is a view of the format of the actual content of an IPv6 extended header,
- FIG. 8 is a view illustrating a network to which the present invention is applied,
- FIG. 9 is a view of the basic configuration of communication equipment at a packet receiving side based on the present invention,
- FIG. 10 is a view of a first specific example of communication equipment of FIG. 9,
- FIG. 11 is a view of a second specific example of communication equipment of FIG. 9,
- FIG. 12 is a view of the basic configuration of communication equipment of a packet sending side based on the present invention,
- FIG. 13 is a view of a first specific example of communication equipment of FIG. 12,
- FIG. 14 is a view of a second specific example of communication equipment of FIG. 12,
- FIG. 15 is a view showing in brief a packet communication system to which the present invention is applied,
- FIG. 16 is a view of the basic configuration of an authentication apparatus shown in FIG. 15,
- FIG. 17 is a view of a specific example of the configuration of an authentication means shown in FIG. 16,
- FIG. 18 is a view of an example of a filter key assigning table67 of FIG. 17,
- FIG. 19 is a sequence diagram showing a series of procedures for providing a filter key,
- FIG. 20 is a view briefly showing a network covered by the present invention,
- FIG. 21 is a view of the general configuration of a conventional communication equipment,
- FIG. 22 is a view showing in detail a comparing table12 of FIG. 21,
- FIG. 23 is a view of the format showing the actual content of an IPv4 header,
- FIG. 24 is a view of the format showing the actual content of an IPv6 header,
- FIG. 25 is a view of the format showing the actual content of a TCP header,
- FIG. 26 is a view of the format showing the actual content of a UDP header, and
- FIG. 27 is a view of a specific network to which the present invention is applied.
- FIG. 1 is a flow chart of a packet filtering method according to the present invention.
- What particularly characterize the present invention at steps S11 to S15 shown in the figure are steps S11 and S12.
- Step S11: Filtering information for use in filtering at the receiving side is stored in a packet to be sent to the receiving side and sent from the sending side.
- Step S12: The packet from the sending side is received and the filtering information stored in the packet is detected and used for filtering at the receiving side.
- The filtering operation (S13 to S15) at the receiving side is substantially the same as in the past.
- Step S13: The receiving side holds the filtering information of the receiving side determined in advance and compares the filtering information of the sending side detected from the packet with the filtering information of the receiving side.
- Step S14: If the result of the comparison is that the two match, the packet is allowed to pass.
- Step S15: If the result of the comparison is that the two do not match, the packet is discarded.
- As explained above, the present invention determines the filter conditions using newly defined filtering information. The codes forming the filtering information will hereinafter be called the “filter key” in the present invention.
- The present invention uses the simple filter key, instead of filter data serving as the troublesome filter conditions of the past shown in FIG. 22, or together with the conventional filter data. Further, this filter key is used for the above comparison.
- The major difference from the past is that, while the convention a filter conditions is determined unambiguously for a user (uniquely), in the present invention, the filter conditions (filter key) are embedded in the packet itself without designating the user.
- Therefore, it becomes possible to secure security, for example, by assigning a single common filter key between a materials purchasing department of one manufacturer and a subcontracting manufacturer liaising with and exclusively delivering materials to that department, embedding this common filter key in communication packets between the two, and performing the filtering. This results in a major reduction in the amount of the filter conditions.
- In this way, the present invention realizes the desired filtering by embedding a specific filter key predetermined between communicating partners into each packet used for that communication. In this case, however, there is the problem as to where, in the packet, the filter key should be stored.
- To solve this problem, the present invention adopts the following technique for storage of the filter key so as to simultaneously solve the above-mentioned second problem, that is, the TCP header or UDP header being encrypted by the IPsec and thus the filtering becoming impossible. The background leading to this storage technique will be explained step by step along with the following drawings.
- FIG. 2 is a view of a general packet including a TCP/UDP header.
- In the figure, the IP header is placed at the head of the packet PKT, then the TCP header (or UDP header) is placed, then finally the inherent data follows.
- FIG. 3 is a view of a general packet employing IPsec.
- If adopting IPsec for the packet PKT of FIG. 2, the IPsec ESP (Encapsulating Security Payload) header is placed right after the IP header, the following TCP header (or UDP header) and data end up being encrypted (shown by hatching), and the above-mentioned second problem is caused.
- FIG. 4 is a view of a packet in the case of use of conventional filtering.
- The filter conditions explained in FIG. 22 are set at F (for IP header) or F′ (for TCP or UDP header) in the packet PKT.
- FIG. 5 is a view of a packet storing a filter key based on the present invention.
- This packet is a packet in compliance with IPv6. The filter key FK is stored in the IPv6 extended header (EXT). Alternatively, this EXT is formed as a filter key header.
- Further, the filter key FK′ (shown by broken lines) is stored in a flow label region in the IPv6 header. This flow label region is already shown as “Flow Label” at the top right of FIG. 24 (IPv6 header) explained above. The method of use of this region has not yet been decided.
- FIG. 6 is a view of a packet in the case of employing IPsec in a packet of the present invention shown in FIG. 5.
- As clear from this figure, even if the TCP header (or UDP header) is encrypted by the IPsec, the filter key FK will not be affected at all. The IPv6 extended header where this filter key FK is stored or formed as a filter key header will be illustrated next.
- FIG. 7 is a view of the format of the actual content of an IPv6 extended header.
- This IPv6 extended header is based on the option format of IPv6.
- As shown in the figure, the IPv6 extended header EXT is arranged, in the format, after the IPv6 header shown in FIG. 24. Further, it is possible to connect a plurality of EXT's in series. Therefore, the IPsec encrypted header shown in FIG. 6 can also be placed as one of the plurality of EXT's. The boundary with the next EXT is known by “Hdr Ext Len” (EXT length) in FIG. 7.
- The filter key FK can be stored in one of the EXT's or the EXT itself can be used as a filter key header.
- If first detecting the “Next Header” shown in FIG. 24, the address of the extended region where the filter key is stored is written there. If accessing the address, the target filter key (FK) is shown as shown in FIG. 7. Note that how to use this extended region is left to the user.
- Summarizing the matters explained above with reference to the drawings from FIG. 2 on, the result is the following:
- (i) When the packet PKT is a packet in compliance with IPv6, the filtering information (filter keys FK, FK′) are stored in the IPv6 header portion.
- (ii) When the packet PKT is a packet in compliance with IPv6, the filtering information (filter key FK) is stored in the IPv6 extended header EXT added to this IPv6 header. (iii) When the packet PKT is a packet in compliance with IPv6, the filtering information (filter key FK′) is stored in the flow label region in the IPv6 header.
- FIG. 8 is a view illustrating a network to which the present invention is applied.
- That is, the configuration where the present invention is applied to the network shown in FIG. 20 is illustrated. Therefore, the
communication equipment 10 a to 10 d are further drawn. - In this figure, as the filter key FK, FK=0x87260fa879cb90 is used (however, this is just an example). That is, the
communication equipment 10 c which is placed at the boundary of one network (Internet) and another network (intranet) holds this FK in advance. - Assume that the
communication equipment communication equipment 10 d. - At this time, the above filter key FK is stored in the series of packets from the
communication equipment 10 b. Therefore, the FK matches with the filter key held in thecommunication equipment 10 c. The packets can therefore pass through theequipment 10 c and reach thecommunication equipment 10 d. - On the other hand, the filter key FK stored in the series of packets from the
communication equipment 10 a are different from the above FK (in the figure, shown with “!” mark, where “!” means “NOT”). Therefore, the series of packets from theequipment 10 a are judged to mismatch in filter key at thecommunication equipment 10 c and are discarded. Note that the comparing means for performing this judgement is shown in the later explained FIG. 9. Here, refer once to FIG. 27. - FIG. 27 is a view of a specific network to which the present invention is applied. A
corporate network 200 is comprised of communication equipment (host) 210 having the functions of the present invention plus arouter 22 connected to an access channel for accessing anedge router 110 of theInternet 100. On the other hand, at abusiness trip location 300,communication equipment 310 to which the present invention is applied is placed via a router 320 (or wireless LAN base station, L2 switch, hub, ADSL modem, media converter, etc.) connected to theInternet 100 through a LAN cable or phone line. Thiscommunication equipment 310 may be a laptop PC as well. In this case, data communications card of a PHS, PDC or W-CDMA is used. - Still further, the
Internet 100 can be accessed by communication equipment to which the present invention is applied from ageneral home 400, ahotel room 500, or ahot spot 600 by a wireless LAN. Note that it is also possible to apply the present invention to arouter 220 in acorporate network 200. In this case, therouter 220 can manage the filter keys of a plurality of communication equipment in the company, so operation of not applying the present invention to thecommunication equipment 210 etc. is also possible. - FIG. 9 is a view of the basic configuration of communication equipment at a packet receiving side based on the present invention. That is, the
communication equipment 10 of this figure is communication equipment of the packet receiving side including means for achieving packet filtering, for example, a router or host. This communication equipment is provided with a filterkey detecting unit 20 which receives the packet PKT sent from the sending side which, stores freely determined filtering information as the filter key FK in a header portion of the packet PKT, and detects a filter key FK from this header portion. - Further, it is provided with a comparing
means 21 for comparing the filter key of the sending side detected by the filterkey detecting unit 20 with the filter key of the receiving side held in advance, judges if the two match, and when they do not match instructs that the received packets be discarded. - This comparing means21 has a filter key table 22 for holding filter keys FK in the form of a list.
- FIG. 10 is a view of a first specific example of communication equipment of FIG. 9.
- The
communication equipment 10 of this first specific example is provided with abuffer 27 for temporarily storing received packet PKT passing through a filter keyheader detecting unit 23 which forms the above-mentioned filterkey detecting unit 20. Here, the above-mentioned comparingmeans 21 is comprised of: - a filter key table22 for holding a predetermined plurality of different filter keys FK (<1>, <2> . . . <k>),
- a
search unit 25 for searching for whether there is a filter key matching with the filter key detected by the filter keyheader detecting unit 23 in the filter key table 22 and when there is none, outputting a discard command, and - a
buffer control unit 26 for receiving the discard command and controlling the system so that the packets stored in abuffer 27 are discarded. - Note that this first specific example shows a configuration of a case of forming a filter key header in the IPv6 extended header added to the IPv6 header when the packets PKT are packets in compliance with IPv6 (FIG. 7).
- On the other hand, the configuration in the case where the packets PKT are packets in compliance with IPv6 and storing the filter key FK′ in the flow label region in the IPv6 header (FIG. 24) is shown in FIG. 11.
- FIG. 11 is a view of a second specific example of communication equipment of FIG. 9.
- The configuration of this figure is basically the same as the configuration of FIG. 10. There are two points of difference: the filter
key detecting unit 20 is a flow labelregion detecting unit 24 and the detected filter key is FK′ (code is same as FK, but stored at different location in packet). The operation is the same as in FIG. 10. - FIG. 12 is a view of the basic configuration of communication equipment of a packet sending side based on the present invention. That is, the
communication equipment 10 of this figure is communication equipment of the packet sending side including means for achieving packet filtering, for example, a host, which is comprised of at least asetting unit 31 for setting freely determined filtering information, a filterkey holding unit 32 for holding filtering information input by the settingunit 31 as a filter key FK, and a filter key storing means 33 for receiving the held filter key FK as input and storing the filter key in the header portion of a packet PKT. As the filter key, it is possible to use the port number of a TCP or UDP as they are. If used in this way, even if an IP packet is encrypted using the IP SEC ESP, filtering of the application becomes possible. Alternatively, in the case of applications where port numbers are not fixed such as VoIP, a value showing that the data is VoIP data may be determined and that value used as the filter key. By such usage, service passing only VoIP becomes possible. Note that the settingunit 31 is for example a keyboard. Codes of filter keys serving as the filtering information are input from there. The filter key may also be notified from another party by a dynamic negotiation. Further, it may be acquired from a system manager. In this case, the filter key may be updated in hour units, day units, or week units. - A specific example of the storing means33 and its peripheral portions will be explained below.
- FIG. 13 is a view of a first specific example of communication equipment of FIG. 12.
- In the first specific example, the packets PKT are packets in compliance with IPv6 and the filter key storing means33 is a filter key
header producing unit 41 which forms a filter key header in an IPv6 extended header added to this IPv6 header. This filter key header is shown in FIG. 7. - The communication equipment10 (for example, host) of this figure is actually provided with other peripheral portions.
- First, there are an encrypted
header producing unit 43 for generating an IPsec encrypted header (see FIG. 6) and an upper layerheader producing unit 44 for generation of a TCP header or UDP header. Further, there is adata generating unit 45 for generating “data” shown in FIG. 12 to be transferred to the receiving side. - Further, there is a packet composing/encrypting
unit 46 for receiving as input the outputs of the filter keyheader producing unit 41, the encryptedheader producing unit 43, the upper layerheader producing unit 44, and thedata generating unit 45 and generating packets PKT for the receiving side. The format of the output of the packets from the packet composing/encryptingunit 46 is as shown in FIG. 6. - FIG. 14 is a view of a second specific example of communication equipment of FIG. 12.
- In this second specific example, the packets PKT are packets in compliance with IPv6 and the filter
key storage unit 33 is an IPv6header producing unit 42 which stores a filter key FK′ in a flow label region in the IPv6 header. The flow label region accommodating this filter key FK′ is shown as “Flow Label” in FIG. 24. - The
communication equipment 10 of this figure also, like that shown in FIG. 13, has an encryptedheader producing unit 43 for generating an IPsec encrypted header, an upper layerheader producing unit 44 for generating a TCP header or UDP header, and adata generating unit 45 for generating data to be transferred to the receiving side and has a packet composing/encryptingunit 46 receiving, as input, the outputs from these. - Above, details of the filtering method and apparatus according to the present invention were clarified. Next, the security setup required when actually using the filtering method and apparatus according to the present invention will be explained. That is, the means of user authentication.
- FIG. 15 is a view showing in brief a packet communication system to which the present invention is applied.
- The
system 50 shown in this figure is a packet communication system where transferred packets are filtered and is provided with apacket transmitting apparatus 51, apacket receiving apparatus 52, and anauthentication apparatus 53. - Here, the
packet transmitting apparatus 51 stores filtering information for use in filtering at the receiving side in the packets to be sent from the sending side to the receiving side for transmission. On the other hand, thepacket receiving apparatus 52 receives packets from the sending side through the network between the server and client, detects the filtering information stored in the received packets, and uses it for filtering at the receiving side. Further, theauthentication apparatus 53 mediating between these receives user authentication information input from a user receiving the filtering service and authenticates the user. After authentication, it assigns and distributes a filter key as filtering information corresponding to that user authentication information to that user. - This
packet communication system 50 can be functionally expressed as in the following (I) and (II): - (I) The
system 50 is a packet communication system providing a filtering service for packets transferred between a server and a client through a network and is provided with a first means and a second means used for access from the server or client of the user side to the network. These are: - (i) a first means for receiving user authentication information and authenticating the user and
- (ii) a second means for assigning and distributing a filter key as filtering information corresponding to that user authentication information to the user after the authentication.
- Note that the first means and second means correspond to a filtering authentication means61 and a filter key providing means 62 in for example the later explained FIG. 16 (same for packet communication system of later explained (II)).
- According to the
packet communication system 50 having the filtering function, user authentication becomes possible for access to the network. For example, access by an employee on a business trip from the business trip location through the Internet to the network of the organization to which he or she belongs becomes possible or access from a local network at the business trip location to the Internet becomes possible. - (II) The
system 50 is a packet communication system providing a filtering service for packets transferred through a network between a server and client and is provided with a first means and second means used for access from a user of the network side to the server or client. These are: - (i) a first means for receiving user authentication information and authenticating a user and
- (ii) a second means for restricting access by assigning and distributing a filter key as filtering information corresponding to the user authentication information to the user after the authentication.
- According to the
packet communication system 50 having the filtering function, if the authentication for a service provided by the server is performed once at the start in hour units, day units, week units, etc., access can be restricted using the filter key without authentication thereafter. - Next, the
above authentication apparatus 53 will be explained in more detail. - FIG. 16 is a view of the basic configuration of an authentication apparatus shown in FIG. 15.
- As shown in the figure, the authentication apparatus53 (FIG. 15) is provided with a filtering authentication means 61 and a filter
key providing means 62. - The filtering authentication means61 receives user authentication information AI input from a user receiving the filtering service and authenticates the user. Further, the filter
key providing means 62 assigns and distributes a filter key FK as filtering information corresponding to the user authentication information to the user after the authentication at the filtering authentication means 61. - FIG. 17 is a view of a specific example of the configuration of an authentication means shown in FIG. 16.
- The top side of the configuration in the figure corresponds to the filtering authentication means61 of FIG. 16, while the bottom side corresponds to the filter
key providing means 62. - That is, the filtering authentication means61 is comprised of a user authentication database (DB) 65 in which the user authentication information AI is registered in advance and a
decision unit 64 for determining the veracity of the user authentication information AI input to and buffered by a receivingbuffer 63 by referring to theuser authentication database 65. - On the other hand, the filter
key providing means 62 is comprised of a filter key assigning table 67 holding preassigned filter keys (FK) corresponding to user authentication information (AI) and a filterkey sending unit 66 for buffering a corresponding filter key FK from the filter key assigning table 67 in a transmittingbuffer 68 once and sending it to the user when the veracity is confirmed. Note that an example of the table 67 is given next. - FIG. 18 is a view of an example of a filter key assigning table of FIG. 17.
- The above user authentication information AI is for example a user ID and password. It would be convenient to the user if using a code or number which the user is familiar with.
- The left column AI of the table67 records user ID's and passwords preset for a predetermined plurality of users. On the other hand, the right column records numbers etc. of filter keys assigned corresponding to the user ID's and passwords.
- When the decision unit17 of FIG. 17 refers to the
user authentication database 65 where authentication information AI having a content similar to the left column AI of this table 67 is recorded and judges that AI input as shown at the top left of FIG. 17 matches with an AI in thedatabase 65, the matching AI (for example, the second AI of the AI column of FIG. 18) is input to the filterkey sending unit 66. This sendingunit 66 takes out the second filter key (in this example, No. 2) corresponding to the AI from the filter key assigning table 67 and provides it to the user side. - The above series of procedures for providing a filter key can be illustrated as follows:
- FIG. 19 is a sequence diagram showing a series of procedures for providing a filter key.
- The sequence shown in this figure will be easy to understand if assuming the network configuration shown in the already explained FIG. 8. FIG. 8, however, does not show at all the hardware/software relating to the
authentication apparatus 53. Theauthentication apparatus 53 may however be present somewhere in FIG. 8. That is, theauthentication apparatus 53 can be located anywhere in FIG. 8. - If speaking more specifically, the
authentication apparatus 53 can be built inside at least one of an authentication use server, firewall, router, and host. The sequence of FIG. 19 shows the case of making theauthentication apparatus 53 an independent authentication use server. - In FIG. 19, first, procedures for authentication relating to the user ID and password are successively performed between the client (user) and authentication server (53).
- If the filtering authentication means61 and a filter key providing means 62 shown in FIG. 17 etc. are used for authentication at the authentication use server and the corresponding filter key FK is distributed from the authentication server to the client, the client sends transmission packets in which the filter key FK is embedded toward the server being accessed. In this case, the filter key FK passes through the above authentication, so is valid. It passes through communication equipment (for example, 10 c in FIG. 8). The transmitted packets can therefore reach the target server (right end).
- Note that the above procedure may also be performed by the WWW.
- In actually using the filtering method and apparatus according to the present invention, it is also necessary to study how to specifically set the above filter key. Several suitable examples of this will be given below:
- a) Use of port number of TCP or UDP as filter key FK
- Note that the TCP and UDP are as explained in FIG. 2 to FIG. 6 and in FIG. 25 and FIG. 26. In particular, the port numbers of the TCP and UDP are shown in FIG. 25 and FIG. 26 as the source port number and destination port number.
- The port number used generally shows the units of service such as file transfer and Web. In the present invention, a copy of the port number is used as the filter key. Therefore, for example, the filter key is embedded in the extended region as FK as shown in FIG. 7.
- If using the port number as the filter key as it is in this way, even when encrypting by IPsec explained above, filtering for each application can be performed with no obstruction.
- b) Making value showing VoIP negotiated among users the filter key FK when using the above-mentioned VoIP for the communication among users
- The above mentioned file transfer, Web, etc. is unambiguously specified by the port number, but the application cannot be specified by the port number in this way for VoIP.
- Therefore, before starting VoIP communications, the users have to specify dynamically that the communication is VoIP. For this, the value showing the VoIP negotiated between the users is embedded like in the filter key FK of FIG. 7, so as to enable the filtering of the VoIP as well.
- In this case, the value showing the VoIP simultaneously acts to enable the communication partner to recognize the VoIP and acts for filtering according to the present invention.
- c) Making a personal ID the filter key FK when users are assigned personal ID's individually under certain specific conditions
- As specific examples of such personal ID's, there are registration numbers (serial numbers) showing software licenses, employee numbers of individual companies, etc.
- In general, the registration number of software is effective in preventing illegitimate access to the server I from a malicious user when a new version of software is provided by a software manufacturer from the server to a user and is authentication information (AI) frequently routinely used. This is convenient for use as a filter key as well.
- Further, in general, an employee number is allotted to an individual employee in a company, so this is also convenient for use as a filter key.
- The settings (a), b) and c)) of the filter key explained above utilize existing codes, numbers, etc. as they are as filter keys. However, by newly defining and applying this filter key, it is possible to realize a packet communication service never before seen. Examples are shown in the following 1) and 2):
- 1) Presetting a shared ID specifying a group and making the shared ID the filter key when users are users belonging to a certain group.
- The “group” spoken of here is for example a group forming a conference of an academic society or company in which a large number of users get together.
- For example, if providing a service wherein only a user participating in the above conference can access the Internet or other outside network using this conference network as an access network, the value of the conference can be enhanced.
- In this case, the conventional filtering technique was to set separate filter conditions (see FIG. 22) individually for individual users participating in the above conference. This however is complicated and troublesome.
- Therefore, by using the present invention, a single shared ID is set for all the participating members specifying the above conference. This shared ID is distributed to all of these members in advance. By doing this, it is possible to perform filtering in group units (for each conference) extremely simply.
- 2) Making a user ID notified in advance to only a user allowed to use content provided by multicast packets the filter key FK when multicast packets are distributed simultaneously to a plurality of users.
- For example, when a movie distributor simultaneously distributes a movie to a large number of users, multicast packets can be used. The multicast packets, however, reach all users insofar as there is no other gate means and therefore the content ends up being provided free of charge.
- Therefore, by using the present invention, it becomes possible to selectively provide content to only users paying a reception fee extremely simply.
- That is, as the above filter key FK, use is made of the same user ID commonly notified to only users allowed to use the above content (movies etc.), that is, users paying a reception fee. By doing this, only users which know the user ID can use the content. Note that the means for notification may be the Web, telephone, or facsimile.
- If further developing the above modes of use, if preparing a plurality of types of common user ID's and individually assigning the user ID's to the plurality of types of movie programs offered by the above movie distributor, it is possible to distribute the desired movies to only users paying a reception fee for each movie program.
- Finally, an explanation of the case of use of packets of IPv6 in the figure referring again to the above-mentioned FIG. 15 may be added as follows: However, the content is the same as that already explained using FIG. 5 and FIG. 7. That is, when the packet PKT is a packet in compliance with IPv6, the filtering information is stored in the extended header of the IPv6.
- Similarly, when the packet PKT is a packet in compliance with IPv6, the filtering information is stored in the flow label region in the IPv6 header.
- The embodiments of the present invention explained above are as shown in the following appendices:
- (Appendix 1) A packet filtering method characterized by storing filtering information for use in filtering at a receiving side in a packet to be sent to the receiving side and sending it from a sending side.
- (Appendix 2) A packet filtering method characterized by receiving a packet from a sending side, detecting filtering information stored in that packet, and using it for filtering at a receiving side.
- (Appendix 3) A packet filtering method as set forth in
appendix 2, characterized by having the receiving side hold predetermined filtering information of the receiving side, compare filtering information of the sending side detected from the packet with the filtering information of the receiving side, and, when the two do not match, discard that packet. - (Appendix 4) A packet filtering method as set forth in
appendix - (Appendix 5) A packet filtering method as set forth in
appendix - (Appendix 6) A packet filtering method as set forth in
appendix - (Appendix 7) Communication equipment at a packet sending side including a function unit for achieving a packet filtering,
- the communication equipment characterized by having at least:
- a setting unit for setting freely determined filtering information,
- a filter key holding unit for holding the filtering information input by the setting unit as a filter key, and
- a filter key storing function unit for receiving as input the held filter key and storing the filter key in a header portion of a packet.
- (Appendix 8) Communication equipment as set forth in
appendix 7, characterized in that when the packet is a packet in compliance with IPv6, the filter key storing function unit is a filter key header producing unit which forms a filter key header in an IPv6 extended header added to the IPv6 header. - (Appendix 9) Communication equipment as set forth in
appendix 8, characterized by further having: - an encrypted header producing unit for generating an IPsec encrypted header,
- an upper layer header producing unit for generating a TCP header or UDP header, and
- a data generating unit for generating data to be transferred to the receiving side.
- (Appendix 10) Communication equipment as set forth in
appendix 9, characterized by further having a packet composing/encrypting unit for receiving as input the outputs of the filter key header producing unit, encrypted header producing unit, upper layer header producing unit, and data generating unit and generating a packet to the receiving side. - (Appendix 11) Communication equipment as set forth in
appendix 7, characterized in that when the packet is a packet in compliance with IPv6, the filter key storage unit is an IPv6 header producing unit for storing the filter key in a flow label region in the IPv6 header. - (Appendix 12) Communication equipment as set forth in
appendix 11, characterized by further having: - an encrypted header producing unit for generating an IPsec encrypted header,
- an upper layer header producing unit for generating a TCP header or UDP header, and
- a data generating unit for generating data to be transferred to the receiving side.
- (Appendix 13) Communication equipment as set forth in
appendix 12, characterized by further having a packet composing/encrypting unit for receiving as input the outputs of the filter key header producing unit, encrypted header producing unit, upper layer header producing unit, and data generating unit and generating a packet to the receiving side. - (Appendix 14) Communication equipment of a packet receiving side including a function unit for achieving a packet filtering,
- the communication equipment characterized by being provided with:
- a filter key detecting unit for receiving a packet sent from a sending side while storing freely determined filtering information as a filter key in a header portion of the packet and detecting the filter key from the header portion and
- a comparing function unit for comparing a filter key of a sending side detected by the filter key detecting unit with a filter key of the receiving side held in advance, determining if the two do not match, and, when they do not match, discarding the received packet.
- (Appendix 15) Communication equipment as set forth in appendix 14, characterized by forming a filter key header in an IPv6 extended header added to an IPv6 header when the packet is a packet in compliance with IPv6.
- (Appendix 16) Communication equipment as set forth in appendix 14, characterized by storing the filter key header in a flow label region in an IPv6 header when the packet is a packet in compliance with IPv6.
- (Appendix 17) Communication equipment as set forth in appendix 14, characterized in that:
- the equipment is provided with a buffer for temporarily storing a received packet passing through the filter key detecting unit and in that
- the comparing function unit is comprised of:
- a filter key table holding a predetermined plurality of different filter keys,
- a search unit for searching if there is a filter key matching with a filter key detected by the filter key detecting unit in the filter key table and when there is none, outputting a discard command, and
- a buffer control unit for receiving the discard command and controlling the system so as to discard the packet stored in the buffer.
- (Appendix 18) An authentication apparatus having:
- a filtering authentication function unit for receiving user authentication information input from a user receiving a filtering service and authenticating the user and
- a filter key providing function unit for assigning and distributing a filter key as filtering information corresponding to the user authentication information to the user after the authentication at the filtering authentication function unit.
- (Appendix 19) An authentication apparatus as set forth in appendix 18, characterized in that:
- the filtering authentication function unit has:
- a user authentication database in which user authentication information is registered in advance and
- a decision unit for determining the veracity of the input user authentication information by referring to the user authentication database and
- the filter key providing function unit has:
- a filter key assigning table holding a filter key assigned in advance corresponding to user authentication information and
- a filter key sending unit for sending a corresponding filter key from the filter key assigning table to the user when the veracity is confirmed.
- (Appendix 20) An authentication apparatus as set forth in appendix 18, characterized in that the authentication apparatus is built in at least one of an authentication use server, firewall, router, and host.
- (Appendix 21) An authentication apparatus as set forth in appendix 18, characterized in that the user authentication information is a user ID and password.
- (Appendix 22) An authentication apparatus as set forth in appendix 18, characterized by using a TCP or UDP port number as the filter key.
- (Appendix 23) An authentication apparatus as set forth in appendix 18, characterized by making a value showing a VoIP negotiated between users as the filter key when communicating among users by using VoIP.
- (Appendix 24) An authentication apparatus as set forth in appendix 18, characterized by making a personal ID the filter key when a personal ID is assigned individually to a user under certain specific conditions.
- (Appendix 25) An authentication apparatus as set forth in appendix 18, characterized by determining in advance a shared ID specifying a group and making that shared ID the filter key when the user is a user belonging to a certain group.
- (Appendix 26) An authentication apparatus as set forth in appendix 18, characterized by making a user ID notified in advance to only a user allowed to use content provided by a multicast packet as the filter key when a multicast packet is distributed at the same time to a plurality of users.
- (Appendix 27) An authentication apparatus as set forth in appendix 18, characterized by storing the filtering information in an IPv6 extended header when the packet is a packet in compliance with IPv6.
- (Appendix 28) An authentication apparatus as set forth in appendix 18, characterized by storing the filtering information in a flow label region in an IPv6 header when the packet is a packet in compliance with IPv6.
- (Appendix 29) A packet communication system where a transferred packet is filtered,
- the packet communication system characterized by being provided with:
- a packet transmitting apparatus for storing filtering information for use in filtering at a receiving side in a packet to be sent to the receiving side and sending it from a sending side,
- a packet receiving apparatus for receiving a packet from the sending side through a network between a server and client, detecting filtering information stored in the received packet, and using it for filtering at the receiving side, and
- an authentication apparatus for receiving user authentication information input from a user receiving the filtering service, authenticating the user, and assigning and distributing a filter key as filtering information corresponding to the user authentication information to the user after the authentication.
- (Appendix 30) A packet communication system where a filtering service is provided for a packet transferred through a network between a server and a client,
- the packet communication system characterized by being provided with:
- function units used for access from the server or client of the user side to the network, that is,
- a first function unit for receiving user authentication information and authenticating the user and
- a second function unit for restricting access by assigning and distributing a filter key as filtering information corresponding to the user authentication information to the user after the authentication.
- (Appendix 31) A packet communication system where a filtering service is provided for a packet transferred through a network between a server and a client,
- the packet communication system characterized by being provided with:
- function units used for access from a user on a network side to the server or client, that is,
- a first function unit for receiving user authentication information and authenticating the user and
- a second function unit for restricting access by assigning and distributing a filter key as filtering information corresponding to the user authentication information to the user after the authentication.
- As explained above, according to the present invention, the following effects are obtained:
- (1) The table showing the filter conditions need only store the filter keys. Further, the filter keys do not correspond to the users (that is, correspond to IP addresses of all related terminals). It is possible to set them in correspondence with specific groups. Therefore, setting of filter keys in the table, that is, entries, is greatly streamlined. Further, the required memory capacity of the table can be greatly reduced.
- In the past, as clear from the explanation of the filter conditions shown in FIG. 22, there is a large variety of filter condition data, so the conditions for comparison (ADD or OR) become complicated, but in the present invention, as explained above, the table stores only the filter keys. Thus, the logical processing for comparison is strikingly streamlined. Therefore, the filtering is greatly increased in speed.
- (2) If the IPsec protocol is introduced, conventional packet filtering using the filter conditions in the TCP header or UDP header becomes impossible due to encryption of the headers, but according to the present invention, even if the TCP header or UDP header is encrypted, the filter key is removed from the coverage of the encryption, as shown in FIG. 6, so there is no obstacle at all to packet filtering.
- Therefore, if dealing with an application where the value of the port number becomes unstable or if the value of the port number becomes unclear due to encryption, it is possible to perform filtering which does not prohibit pass through of all of the packets and to discard packets other than the necessary packets.
- (3) Packet filtering can easily be applied even to applications such as VoIP which has been difficult in the past.
- (4) Packet filtering in units of groups such as academic societies, conferences, etc. in which large number of users participate can be easily performed.
- (5) Selective distribution to users corresponding to payment of fees for receiving multicast content such as distribution of movies can be performed simply.
Claims (10)
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2001041746 | 2001-02-19 | ||
JP2001-041746 | 2001-02-19 | ||
PCT/JP2002/001434 WO2002067512A1 (en) | 2001-02-19 | 2002-02-19 | Packet filtering method and packet communication system for ensuring communication security |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2002/001434 Continuation WO2002067512A1 (en) | 2001-02-19 | 2002-02-19 | Packet filtering method and packet communication system for ensuring communication security |
Publications (2)
Publication Number | Publication Date |
---|---|
US20040205359A1 true US20040205359A1 (en) | 2004-10-14 |
US8595482B2 US8595482B2 (en) | 2013-11-26 |
Family
ID=18904137
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/642,504 Expired - Fee Related US8595482B2 (en) | 2001-02-19 | 2003-08-18 | Packet filtering method for securing security in communications and packet communications system |
Country Status (3)
Country | Link |
---|---|
US (1) | US8595482B2 (en) |
JP (1) | JP4330342B2 (en) |
WO (1) | WO2002067512A1 (en) |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050129013A1 (en) * | 2003-12-11 | 2005-06-16 | Rasanen Juha A. | Controlling transportation of data packets |
US20050163316A1 (en) * | 2004-01-22 | 2005-07-28 | Wing Daniel G. | Method and apparatus for transporting encrypted media streams over a wide area network |
US20050185624A1 (en) * | 2004-01-23 | 2005-08-25 | Siemens Aktiengesellschaft | Communication system and method for processing a request message sent from a mobile radio terminal of a mobile radio communication network to a message filter processor |
US20060288411A1 (en) * | 2005-06-21 | 2006-12-21 | Avaya, Inc. | System and method for mitigating denial of service attacks on communication appliances |
US20070121583A1 (en) * | 2005-11-07 | 2007-05-31 | Cisco Technology, Inc. | Method and apparatus to provide cryptographic identity assertion for the PSTN |
US20070250641A1 (en) * | 2006-04-21 | 2007-10-25 | Microsoft Corporation | Meetings structures and global unique identifiers |
US20080148384A1 (en) * | 2006-12-13 | 2008-06-19 | Avaya Technology Llc | Embedded Firewall at a Telecommunications Endpoint |
US20080310440A1 (en) * | 2007-06-13 | 2008-12-18 | Jyshyang Chen | Network interface system with filtering function |
US20090109970A1 (en) * | 2007-10-24 | 2009-04-30 | Hitachi, Ltd. | Network system, network management server, and access filter reconfiguration method |
US7873704B2 (en) | 2002-09-30 | 2011-01-18 | Ntt Docomo, Inc. | Communication system, relay device, and communication control method |
US9210187B1 (en) * | 2015-01-13 | 2015-12-08 | Centri Technology, Inc. | Transparent denial of service protection |
US20170104642A1 (en) * | 2015-10-07 | 2017-04-13 | Fujitsu Limited | Relay apparatus and relay method |
US20180062998A1 (en) * | 2016-08-31 | 2018-03-01 | Viavi Solutions Inc. | Packet filtering using binary search trees |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7613195B2 (en) * | 2003-10-27 | 2009-11-03 | Telefonaktiebolaget L M Ericsson (Publ) | Method and system for managing computer networks |
WO2005116851A2 (en) * | 2004-05-25 | 2005-12-08 | Postini, Inc. | Electronic message source information reputation system |
JP4419951B2 (en) | 2005-12-22 | 2010-02-24 | ブラザー工業株式会社 | Communication device |
JP4933286B2 (en) * | 2007-01-26 | 2012-05-16 | 株式会社日立製作所 | Encrypted packet communication system |
JP2009232012A (en) * | 2008-03-21 | 2009-10-08 | Hitachi Software Eng Co Ltd | Secret data communication system and program |
JP5587085B2 (en) * | 2010-07-27 | 2014-09-10 | パナソニック株式会社 | COMMUNICATION SYSTEM, CONTROL DEVICE, AND CONTROL PROGRAM |
JP6724367B2 (en) * | 2016-01-07 | 2020-07-15 | ヤマハ株式会社 | Communication system and communication device |
Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6092191A (en) * | 1995-11-30 | 2000-07-18 | Kabushiki Kaisha Toshiba | Packet authentication and packet encryption/decryption scheme for security gateway |
US6154839A (en) * | 1998-04-23 | 2000-11-28 | Vpnet Technologies, Inc. | Translating packet addresses based upon a user identifier |
US6359886B1 (en) * | 1998-08-17 | 2002-03-19 | Compaq Computer Corporation | Method and apparatus for filtering and routing communications frames |
US20020049899A1 (en) * | 1998-09-01 | 2002-04-25 | Stacy Kenworthy | Network attached device with dedicated firewall security |
US6389532B1 (en) * | 1998-04-20 | 2002-05-14 | Sun Microsystems, Inc. | Method and apparatus for using digital signatures to filter packets in a network |
US20030115341A1 (en) * | 2001-12-17 | 2003-06-19 | Bhaskar Sinha | Method and system for authenticating a user in a web-based environment |
US6591291B1 (en) * | 1997-08-28 | 2003-07-08 | Lucent Technologies Inc. | System and method for providing anonymous remailing and filtering of electronic mail |
US6606706B1 (en) * | 1999-02-08 | 2003-08-12 | Nortel Networks Limited | Hierarchical multicast traffic security system in an internetwork |
US6636516B1 (en) * | 1999-03-17 | 2003-10-21 | Nec Corporation | QOS-based virtual private network using ATM-based internet virtual connections |
US6650710B1 (en) * | 1997-11-17 | 2003-11-18 | Dominique Hamery | Packet filtering |
US6738361B1 (en) * | 2000-05-31 | 2004-05-18 | Nokia Ip Inc. | Method, apparatus and computer program for IP traffic prioritization in IP networks |
US6987768B1 (en) * | 1999-06-02 | 2006-01-17 | Fujitsu Limited | Packet transferring apparatus |
US7292530B2 (en) * | 2000-12-29 | 2007-11-06 | Intel Corporation | Method and apparatus to manage packet fragmentation |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH084272B2 (en) * | 1993-03-03 | 1996-01-17 | 日本電気株式会社 | Concentrator for local area network |
JPH10233795A (en) * | 1997-02-18 | 1998-09-02 | Nippon Telegr & Teleph Corp <Ntt> | Packet communication processing method |
JP3599552B2 (en) * | 1998-01-19 | 2004-12-08 | 株式会社日立製作所 | Packet filter device, authentication server, packet filtering method, and storage medium |
JP2000059357A (en) * | 1998-08-07 | 2000-02-25 | Nippon Telegr & Teleph Corp <Ntt> | Closed area group communication system, management server system, communication terminal and their program storage medium |
JP2000261487A (en) | 1999-03-10 | 2000-09-22 | Nec Corp | Device and system for packet filtering |
-
2002
- 2002-02-19 WO PCT/JP2002/001434 patent/WO2002067512A1/en active Application Filing
- 2002-02-19 JP JP2002566914A patent/JP4330342B2/en not_active Expired - Fee Related
-
2003
- 2003-08-18 US US10/642,504 patent/US8595482B2/en not_active Expired - Fee Related
Patent Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6092191A (en) * | 1995-11-30 | 2000-07-18 | Kabushiki Kaisha Toshiba | Packet authentication and packet encryption/decryption scheme for security gateway |
US6185680B1 (en) * | 1995-11-30 | 2001-02-06 | Kabushiki Kaisha Toshiba | Packet authentication and packet encryption/decryption scheme for security gateway |
US6591291B1 (en) * | 1997-08-28 | 2003-07-08 | Lucent Technologies Inc. | System and method for providing anonymous remailing and filtering of electronic mail |
US6650710B1 (en) * | 1997-11-17 | 2003-11-18 | Dominique Hamery | Packet filtering |
US6389532B1 (en) * | 1998-04-20 | 2002-05-14 | Sun Microsystems, Inc. | Method and apparatus for using digital signatures to filter packets in a network |
US6154839A (en) * | 1998-04-23 | 2000-11-28 | Vpnet Technologies, Inc. | Translating packet addresses based upon a user identifier |
US6359886B1 (en) * | 1998-08-17 | 2002-03-19 | Compaq Computer Corporation | Method and apparatus for filtering and routing communications frames |
US20020049899A1 (en) * | 1998-09-01 | 2002-04-25 | Stacy Kenworthy | Network attached device with dedicated firewall security |
US6606706B1 (en) * | 1999-02-08 | 2003-08-12 | Nortel Networks Limited | Hierarchical multicast traffic security system in an internetwork |
US6636516B1 (en) * | 1999-03-17 | 2003-10-21 | Nec Corporation | QOS-based virtual private network using ATM-based internet virtual connections |
US6987768B1 (en) * | 1999-06-02 | 2006-01-17 | Fujitsu Limited | Packet transferring apparatus |
US6738361B1 (en) * | 2000-05-31 | 2004-05-18 | Nokia Ip Inc. | Method, apparatus and computer program for IP traffic prioritization in IP networks |
US7292530B2 (en) * | 2000-12-29 | 2007-11-06 | Intel Corporation | Method and apparatus to manage packet fragmentation |
US20030115341A1 (en) * | 2001-12-17 | 2003-06-19 | Bhaskar Sinha | Method and system for authenticating a user in a web-based environment |
Cited By (31)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7873704B2 (en) | 2002-09-30 | 2011-01-18 | Ntt Docomo, Inc. | Communication system, relay device, and communication control method |
US20050129013A1 (en) * | 2003-12-11 | 2005-06-16 | Rasanen Juha A. | Controlling transportation of data packets |
US7916726B2 (en) * | 2003-12-11 | 2011-03-29 | Nokia Corporation | Controlling transportation of data packets |
US20050163316A1 (en) * | 2004-01-22 | 2005-07-28 | Wing Daniel G. | Method and apparatus for transporting encrypted media streams over a wide area network |
US7308101B2 (en) * | 2004-01-22 | 2007-12-11 | Cisco Technology, Inc. | Method and apparatus for transporting encrypted media streams over a wide area network |
US20050185624A1 (en) * | 2004-01-23 | 2005-08-25 | Siemens Aktiengesellschaft | Communication system and method for processing a request message sent from a mobile radio terminal of a mobile radio communication network to a message filter processor |
US20080175220A1 (en) * | 2004-01-23 | 2008-07-24 | Siemens Aktiengesellschaft | Communication system and method for processing a request message sent from a mobile radio terminal of a mobile radio communication network to a message filter processor |
US20060288411A1 (en) * | 2005-06-21 | 2006-12-21 | Avaya, Inc. | System and method for mitigating denial of service attacks on communication appliances |
US20070121583A1 (en) * | 2005-11-07 | 2007-05-31 | Cisco Technology, Inc. | Method and apparatus to provide cryptographic identity assertion for the PSTN |
US8953771B2 (en) | 2005-11-07 | 2015-02-10 | Cisco Technology, Inc. | Method and apparatus to provide cryptographic identity assertion for the PSTN |
US20070250641A1 (en) * | 2006-04-21 | 2007-10-25 | Microsoft Corporation | Meetings structures and global unique identifiers |
US7660852B2 (en) * | 2006-04-21 | 2010-02-09 | Microsoft Corporation | Meeting structures and global unique identifiers |
US20080148384A1 (en) * | 2006-12-13 | 2008-06-19 | Avaya Technology Llc | Embedded Firewall at a Telecommunications Endpoint |
US8302179B2 (en) | 2006-12-13 | 2012-10-30 | Avaya Inc. | Embedded firewall at a telecommunications endpoint |
US7852756B2 (en) * | 2007-06-13 | 2010-12-14 | 02Micro International Limited | Network interface system with filtering function |
US20110075678A1 (en) * | 2007-06-13 | 2011-03-31 | Jyshyang Chen | Network interface system with filtering function |
US8165020B2 (en) | 2007-06-13 | 2012-04-24 | O2Micro International Limited | Network interface system with filtering function |
US20080310440A1 (en) * | 2007-06-13 | 2008-12-18 | Jyshyang Chen | Network interface system with filtering function |
US20090109970A1 (en) * | 2007-10-24 | 2009-04-30 | Hitachi, Ltd. | Network system, network management server, and access filter reconfiguration method |
US8081640B2 (en) * | 2007-10-24 | 2011-12-20 | Hitachi, Ltd. | Network system, network management server, and access filter reconfiguration method |
US9298940B1 (en) | 2015-01-13 | 2016-03-29 | Centri Technology, Inc. | Secure storage for shared documents |
US9210187B1 (en) * | 2015-01-13 | 2015-12-08 | Centri Technology, Inc. | Transparent denial of service protection |
US9503262B2 (en) | 2015-01-13 | 2016-11-22 | Centri Technology, Inc. | Transparent denial of service protection |
US9584321B2 (en) | 2015-01-13 | 2017-02-28 | Centri Technology, Inc. | Secure storage for shared documents |
US9647836B2 (en) | 2015-01-13 | 2017-05-09 | Centri Technology, Inc. | Secure storage for shared documents |
US20170104642A1 (en) * | 2015-10-07 | 2017-04-13 | Fujitsu Limited | Relay apparatus and relay method |
US10333803B2 (en) * | 2015-10-07 | 2019-06-25 | Fujitsu Limited | Relay apparatus and relay method |
US20180062998A1 (en) * | 2016-08-31 | 2018-03-01 | Viavi Solutions Inc. | Packet filtering using binary search trees |
US11005977B2 (en) * | 2016-08-31 | 2021-05-11 | Viavi Solutions Inc. | Packet filtering using binary search trees |
US11770463B2 (en) | 2016-08-31 | 2023-09-26 | Viavi Solutions Inc. | Packet filtering using binary search trees |
US11968286B2 (en) | 2016-08-31 | 2024-04-23 | Viavi Solutions Inc. | Packet filtering using binary search trees |
Also Published As
Publication number | Publication date |
---|---|
JPWO2002067512A1 (en) | 2004-06-24 |
US8595482B2 (en) | 2013-11-26 |
WO2002067512A1 (en) | 2002-08-29 |
JP4330342B2 (en) | 2009-09-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8595482B2 (en) | Packet filtering method for securing security in communications and packet communications system | |
EP1317111B1 (en) | A personalized firewall | |
US7743158B2 (en) | Access network dynamic firewall | |
JP5084086B2 (en) | System and method for providing dynamic network authorization, authentication and account | |
US9112909B2 (en) | User and device authentication in broadband networks | |
US8160068B2 (en) | System and method for facilitating communication between a CMTS and an application server in a cable network | |
US7568107B1 (en) | Method and system for auto discovery of authenticator for network login | |
US20020110123A1 (en) | Network connection control apparatus and method | |
RU2316129C2 (en) | Safety in networks of arbitrary localization level | |
US20040177247A1 (en) | Policy enforcement in dynamic networks | |
JPH11168511A (en) | Packet authentication method | |
JPH11168510A (en) | Packet verification method | |
GB2316841A (en) | Method for controlling a firewall | |
CA2415527C (en) | Ipsec through l2tp | |
US8175277B2 (en) | Intercepting a communication session in a telecommunication network | |
JP2004032525A (en) | USER AUTHENTICATION QoS POLICY MANAGEMENT SYSTEM AND METHOD, AND LAN SWITCH | |
US20120084410A1 (en) | Configuring Interfaces of a Switch Using Templates | |
US20040030765A1 (en) | Local network natification | |
JP2004062417A (en) | Certification server device, server device and gateway device | |
CN100568836C (en) | Method and server for allocating local area network resources to terminals according to terminal types | |
WO2007066286A2 (en) | Content-based authorization method and apparatus | |
CN112437355B (en) | Method and system for realizing three-layer multicast | |
JP4003634B2 (en) | Information processing device | |
Cisco | Configuring the Embedded Gatekeeper | |
JP2006352917A (en) | Packet filtering method and packet communication system for ensuring communication security |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: FUJITSU LIMITED, JAPAN Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MATSUHIRA, NAOKI;REEL/FRAME:015482/0808 Effective date: 20030905 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
LAPS | Lapse for failure to pay maintenance fees |
Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20211126 |